components/nethack/nethack.copyright
changeset 301 ab9eef4f4029
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/components/nethack/nethack.copyright	Tue Jun 14 13:02:49 2011 -0700
@@ -0,0 +1,150 @@
+----------------------------------------------------------------------
+"NetHack, Copyright 1985-2003"
+Copyright 1991 University of Wisconsin-Madison
+Copyright (c) 1983 Regents of the University of California.
+Copyright (C) 1987-1990 by Ken Arromdee
+Copyright (C) 1992-2000 Trolltech AS.  All rights reserved.
+Copyright (C) 1991,1993,1995 by Robert Patrick Rankin
+Copyright (C) 1998 by Anthony Taylor <[email protected]>
+Copyright (C) 1998 by Erik Andersen <[email protected]>
+Copyright (C) 2001-2003 by Alex Kompel <[email protected]>
+Copyright (C) 2002 by Dylan Alex Simon
+Copyright (c) 1988-1989 AT&T
+Copyright (c) 1989,1992 Janet Walz
+Copyright (c) 1989 Mike Threepoint
+Copyright (c) 1989-1996 by Jean-Christophe Collet
+Copyright (c) 1986-1995 by M. Stephenson
+Copyright (c) 1989y Norm Meluch and Stephen Spackman
+Copyright (c) 1991-1993 P. Winner
+Copyright (c) 1990-1993 by David Cohrs
+Copyright (c) 1989,1991-1993 Izchak Miller
+Copyright (c) 1992 by Jon Watte
+Copyright (c) 1991-1996 Gregg Wonderly, Naperville Illinois
+Copyright (c) 1994 by Boudewijn Wayers
+Copyright (c) 1994-1996 Andrew Church, Olney, Maryland
+Copyright (c) 1990-1996,2002 by Dean Luick
+Copyright (c) 1991 Michael Hamel
+Copyright (c) 1998-1999,2002 by Kevin Hugo
+Copyright (c) 2002 Mark Modrall
+Copyright (c) 1989 Benson I. Margulies
+Copyright (c) 1989 Steve Linhart
+Copyright (c) 1989 Eric Raymond
+Copyright (c) 1999-2002 Christian Bressler
+Copyright (c) 1993 David Hairston
+Copyright (c) 2000 Janne Salmij??rv
+Copyright (c) 1992 Hao-Yang Wang, Jonathan Handler
+Copyright (c) 1990-1996 Kenneth Lorber
+Copyright (c) 1992-1993 Jon W{tte 1993.
+Copyright (c) 1997 Michael Allison
+Copyright (c) 1990-2003 NetHack PC Development Team 1990-2003
+Copyright (c) 1993 Macintosh NetHack Port Team
+Copyright (c) 1992-1999 the NetHack Development Team
+Copyright (c) 1988-1992 Olaf Seibert
+Copyright (c) 2001 Slash'EM development team
+Copyright (c) 1988 Steve Creps
+Copyright (c) 1985-2003 Stichting Mathematisch Centrum, Amsterdam
+Copyright (c) Timo Hakulinen, 1990, 1991, 1992, 1993, 1996.
+Copyright (c) 1999-2002 Yitzhak Sapir
+Copyright (c) 1996-2001 Warwick Allison
+Copyright (c) 1986 Scott R. Turner, srt@ucla
+Copyright (c) 1990 David Koblas
+COPYRIGHT "Copyright 1989-1991 Network Computing Devices, Inc."
+with acknowledgements to Kevin Darcy
+----------------------------------------------------------------------
+                    NETHACK GENERAL PUBLIC LICENSE
+                    (Copyright 1989 M. Stephenson)
+
+               (Based on the BISON general public license,
+                   copyright 1988 Richard M. Stallman)
+
+ Everyone is permitted to copy and distribute verbatim copies of this
+ license, but changing it is not allowed.  You can also use this wording to
+ make the terms for other programs.
+
+  The license agreements of most software companies keep you at the mercy of
+those companies.  By contrast, our general public license is intended to give
+everyone the right to share NetHack.  To make sure that you get the rights we
+want you to have, we need to make restrictions that forbid anyone to deny you
+these rights or to ask you to surrender the rights.  Hence this license
+agreement.
+
+  Specifically, we want to make sure that you have the right to give away
+copies of NetHack, that you receive source code or else can get it if you
+want it, that you can change NetHack or use pieces of it in new free
+programs, and that you know you can do these things.
+
+  To make sure that everyone has such rights, we have to forbid you to
+deprive anyone else of these rights.  For example, if you distribute copies
+of NetHack, you must give the recipients all the rights that you have.  You
+must make sure that they, too, receive or can get the source code.  And you
+must tell them their rights.
+
+  Also, for our own protection, we must make certain that everyone finds out
+that there is no warranty for NetHack.  If NetHack is modified by someone
+else and passed on, we want its recipients to know that what they have is
+not what we distributed.
+
+  Therefore we (Mike Stephenson and other holders of NetHack copyrights) make
+the following terms which say what you must do to be allowed to distribute or
+change NetHack.
+
+
+                        COPYING POLICIES
+
+  1. You may copy and distribute verbatim copies of NetHack source code as
+you receive it, in any medium, provided that you keep intact the notices on
+all files that refer to copyrights, to this License Agreement, and to the
+absence of any warranty; and give any other recipients of the NetHack
+program a copy of this License Agreement along with the program.
+
+  2. You may modify your copy or copies of NetHack or any portion of it, and
+copy and distribute such modifications under the terms of Paragraph 1 above
+(including distributing this License Agreement), provided that you also do the
+following:
+
+    a) cause the modified files to carry prominent notices stating that you
+    changed the files and the date of any change; and
+
+    b) cause the whole of any work that you distribute or publish, that in
+    whole or in part contains or is a derivative of NetHack or any part
+    thereof, to be licensed at no charge to all third parties on terms
+    identical to those contained in this License Agreement (except that you
+    may choose to grant more extensive warranty protection to some or all
+    third parties, at your option)
+
+    c) You may charge a distribution fee for the physical act of
+    transferring a copy, and you may at your option offer warranty protection
+    in exchange for a fee.
+
+  3. You may copy and distribute NetHack (or a portion or derivative of it,
+under Paragraph 2) in object code or executable form under the terms of
+Paragraphs 1 and 2 above provided that you also do one of the following:
+
+    a) accompany it with the complete machine-readable source code, which
+    must be distributed under the terms of Paragraphs 1 and 2 above; or,
+
+    b) accompany it with full information as to how to obtain the complete
+    machine-readable source code from an appropriate archive site.  (This
+    alternative is allowed only for noncommercial distribution.)
+
+For these purposes, complete source code means either the full source
+distribution as originally released over Usenet or updated copies of the
+files in this distribution used to create the object code or executable.
+
+  4. You may not copy, sublicense, distribute or transfer NetHack except as
+expressly provided under this License Agreement.  Any attempt otherwise to
+copy, sublicense, distribute or transfer NetHack is void and your rights to
+use the program under this License agreement shall be automatically
+terminated.  However, parties who have received computer software programs
+from you with this License Agreement will not have their licenses terminated
+so long as such parties remain in full compliance.
+
+
+Stated plainly:  You are permitted to modify NetHack, or otherwise use parts
+of NetHack, provided that you comply with the conditions specified above;
+in particular, your modified NetHack or program containing parts of NetHack
+must remain freely available as provided in this License Agreement.  In
+other words, go ahead and share NetHack, but don't try to stop anyone else
+from sharing it farther.
+
+Copyright (c) 2011, Oracle and/or its affiliates. All rights reserved.